CVE-2022-1666

Severity CVSS v4.0:
Pending analysis
Type:
CWE-522 Insufficiently Protected Credentials
Publication date:
24/06/2022
Last modified:
05/07/2022

Description

The default password for the web application’s root user (the vendor’s private account) was weak and the MD5 hash was used to crack the password using a widely available open-source tool.

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:secheron:sepcos_control_and_protection_relay_firmware:*:*:*:*:*:*:*:* 1.23.0 (including) 1.23.21 (excluding)
cpe:2.3:o:secheron:sepcos_control_and_protection_relay_firmware:*:*:*:*:*:*:*:* 1.24.0 (including) 1.24.8 (excluding)
cpe:2.3:o:secheron:sepcos_control_and_protection_relay_firmware:*:*:*:*:*:*:*:* 1.25.0 (including) 1.25.3 (excluding)
cpe:2.3:h:secheron:sepcos_control_and_protection_relay:-:*:*:*:*:*:*:*


References to Advisories, Solutions, and Tools